Description
Foxit Reader for Mac 2.1.0.0804 and earlier and Foxit Reader for Linux 2.1.0.0805 and earlier suffered from a vulnerability where weak file permissions could be exploited by attackers to execute arbitrary code. After the installation, Foxit Reader's core files were world-writable by default, allowing an attacker to overwrite them with backdoor code, which when executed by privileged user would result in Privilege Escalation, Code Execution, or both.
Published: 2016-10-31
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Foxitsoftware Reader
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T02:35:01.612Z

Reserved: 2016-10-19T00:00:00.000Z

Link: CVE-2016-8856

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2016-10-31T10:59:09.380

Modified: 2026-05-06T22:30:45.220

Link: CVE-2016-8856

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses